computer security 中文意思是什麼

computer security 解釋
電腦安全
  • computer : n. 1. 計算者。2. (電子)計算機;計量器。-ism 電子計算機主義〈認為電子計算機萬能等〉。-erite, -nik 計算機專家;計算機工作者。
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. In computer security, a successful unauthorized access to an adp system

    在計算機安全學中,成功地非法進入自動數據處理系統。
  2. Computer security booklet for small computer systems

    小型電腦系統的電腦保安小冊子
  3. In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place

    在計算機安全學中,經處理操作后,消磁或重寫數據前剩留在存儲器中的數據。
  4. In computer security, aspecific type of interaction between a subject and an object that results in the flow of informationfrom one to the other

    計算機安全學中,在主體和客體之間導致信息相互流動的一種相互作用。
  5. Abstract : in this paper, we present a series of important applications of blind signature to computer security communication, especially to electronic voting and electronic cash

    文摘:根據近年來國內外關于數字簽名的研究背景及進展,闡述盲簽名在計算機保密通信,特別是在電子貨幣等方面的一系列重要應用。
  6. Blowfish is a block cipher created by bruce schneier, a computer security consultant and author of the standard reference

    Blowfish是由bruce schneier創造的一種塊加密演算法, bruce schneier是一名計算機安全顧問,同時也是標準參考
  7. In computer security, the characteristic of a resource that implies its value or importance, as well as its vulnerability to accidental or deliberate threat

    在計算機安全學中,一種資源對偶然事件或蓄意攻擊含有其價值、重要性及其弱點的特性。
  8. In computer security, an error of omission or oversight in software or hardware that permits circumvention of the access control process

    在計算機安全學中,由於軟體或硬體的疏忽引起的錯誤。這種錯誤躲過了存取控制進程。
  9. In computer security, the independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, and to recommend any indicated changes in controls, policy or procedures

    在計算機安全中,為測試計算機控制的正確性,為確保按照既定政策和操作步驟執行,為提供在控制政策和步驟中的任何指定的變化而對系統的記錄和活動進行的獨立的審核和檢查。
  10. Some of the most damaging computer security attacks, including the code red virus, have resulted from a failure to properly parse input

    一些最有破壞性的計算機安全性攻擊(包括「紅色代碼( code red ) 」病毒)都是因未能正確解析輸入而引起的。
  11. The public s awareness on computer security and the deterrent effect of criminal convictions of 4 cases may have accounted for the decrease

    導致有關罪案下降的原因,一方面是大眾對電腦安全提高警覺性,另一方面是有4宗案件的被告人被裁定刑事罪名成立,起了阻嚇作用。
  12. Because of the tremendous growth of the internet, network and computer security is now recognized as essential, but with changes in technology, inevitably come new threats, vulnerabilities, and increased risk

    由於網際網路的巨大發展,網路和計算機安全現在被公認為是一個要素。然而,科技的改革,帶來了不可避免的新威脅,脆弱點,和增強的風險。
  13. In computer security, the use of security personnel to patrol work areas, particularly outside normal working hours, to detect intruders and unauthorized use of terminals, to check for security violations

    計算機安全學中,安全人員在工作間內巡邏,特別是在正常工作時間以外的時間里檢查入侵者、終端的非法使用及其它安全違章行為。
  14. Developers may want to include a computer security expert as part of the design team for implementing an enterprise encryption scheme

    開發人員在實現企業加密計劃時,設計小組中需要包括計算機安全專家。
  15. With repeated hackers attacks on you system, we have come to realize the necessity of hiring a computer - security expert

    重復的黑客攻擊你的系統,我們逐漸意識到聘請一位計算機保安專家的必要性
  16. In computer security, a procedure established for positively identifying a terminal dialing into a computer system by disconnecting the calling terminal and reestablishing the connection by the computer system ' s dialing the telephone number of the calling terminal

    在計算機安全學中,為了確認一個終端叫通了計算機系統,而先切斷該呼叫終端與計算機系統的連接,再由計算機系統呼叫該終端的電話號碼來重建連接的過程。
  17. In computer security, automatic termination and protection of programs and / or processing systems when a hardware or software failure is detected in an automated information system

    在計算機保安技術中,自動化信息系統發現硬、軟體故障或錯誤時,為使系統不致於癱瘓而自動終止程序或處理系統的運行,以便保護它們。
  18. In computer security, searching for telephone numbers and passwords by successively trying various combinations of numbers and letters

    在計算機安全學中,以連續地試驗數字和字母的各種組合來搜索電話號碼或口令的方法。
  19. Trusted computing research on computer security problems

    針對安全問題的可信計算研究
  20. Ortheogonal table, which has wide applications in experimental design, coding theory and computer security is an importan sort of array structres

    正交表是一類非常重要的數組結構,它在正交實驗設計、編碼理論、計算機安全等領域有著廣泛的應用。
分享友人